ALT-PU-2019-3112-1
Closed vulnerabilities
Modified: 2024-09-16
BDU:2019-03643
Уязвимость библиотеки для анализа XML-файлов libexpat, связанная с неверным ограничением xml-ссылок на внешние объекты, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-09-16
BDU:2019-04421
Уязвимость расширения Color Enhancer браузера Google Chrome, позволяющая нарушителю изменить данные HTML-страницы
Modified: 2024-09-16
BDU:2019-04422
Уязвимость компонента Omnibox браузера Google Chrome, позволяющая нарушителю проводить спуфинг-атаки
Modified: 2024-09-16
BDU:2019-04423
Уязвимость браузера Google Chrome, связанная с неправильной авторизацией, позволяющая нарушителю обойти ограничения навигации
Modified: 2024-09-16
BDU:2019-04424
Уязвимость пользовательского интерфейса браузера Google Chrome, позволяющая нарушителю скрыть пользовательский интерфейс безопасности
Modified: 2024-09-16
BDU:2019-04425
Уязвимость компонента Omnibox браузера Google Chrome, позволяющая нарушителю проводить спуфинг-атаки
Modified: 2024-09-16
BDU:2019-04426
Уязвимость пользовательского интерфейса браузера Google Chrome, позволяющая нарушителю скрыть пользовательский интерфейс безопасности
Modified: 2025-02-06
BDU:2019-04508
Уязвимость компонента WebAudio браузера Google Chrome, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
Modified: 2024-09-16
BDU:2020-00168
Уязвимость обработчика PDF-содержимого PDFium веб-браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных, получить несанкционированный доступ к защищаемой информации, а также вызвать отказ в обслуживании
Modified: 2024-09-16
BDU:2020-01751
Уязвимость браузера Google Chrome, связанная с неправильным применением политики безопасности, позволяющая нарушителю получить доступ к конфиденциальным данным
Modified: 2024-09-16
BDU:2020-01758
Уязвимость браузера Google Chrome, связанная с неправильной настройкой политики безопасности, позволяющая нарушителю получить доступ к конфиденциальным данным
Modified: 2024-09-30
BDU:2020-01782
Уязвимость браузера Google Chrome, связанная с использованием памяти после освобождения, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность
Modified: 2024-09-30
BDU:2020-01783
Уязвимость браузера Google Chrome, связанная с чтением за границами буфера в памяти, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность
Modified: 2024-09-30
BDU:2020-01784
Уязвимость браузера Google Chrome, связанная с обходом аутентификации посредством спуфинга, позволяющая нарушителю нарушить целостность данных
Modified: 2024-09-16
BDU:2020-01785
Уязвимость установщика браузера Google Chrome, связанная с небезопасным управлением привилегиями, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность
Modified: 2024-09-16
BDU:2020-01786
Уязвимость адресной строки Omnibox браузера Google Chrome, связанная с обходом аутентификации посредством спуфинга, позволяющая нарушителю нарушить целостность данных
Modified: 2024-09-30
BDU:2020-01787
Уязвимость браузера Google Chrome, связанная с обходом аутентификации посредством спуфинга, позволяющая нарушителю нарушить целостность данных
Modified: 2024-09-30
BDU:2020-01788
Уязвимость браузера Google Chrome, связанная с отсутствием защиты служебных данных, позволяющая нарушителю получить несанкционированный доступ к информации
Modified: 2024-09-30
BDU:2020-01789
Уязвимость обработчика PDF-содержимого PDFium браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность
Modified: 2024-09-16
BDU:2020-01790
Уязвимость браузера Google Chrome, связанная с отсутствием защиты служебных данных, позволяющая нарушителю получить несанкционированный доступ к информации
Modified: 2024-09-16
BDU:2020-01791
Уязвимость браузера Google Chrome, связанная с обходом аутентификации посредством спуфинга, позволяющая нарушителю нарушить целостность данных
Modified: 2024-09-30
BDU:2020-01792
Уязвимость браузера Google Chrome, связанная с обходом аутентификации посредством спуфинга, позволяющая нарушителю нарушить целостность данных
Modified: 2024-09-16
BDU:2020-01793
Уязвимость браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю нарушить целостность данных
Modified: 2024-11-21
CVE-2019-13699
Use after free in media in Google Chrome prior to 78.0.3904.70 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html
- https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html
- https://crbug.com/1001503
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html
- https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html
- https://crbug.com/1001503
Modified: 2024-11-21
CVE-2019-13700
Out of bounds memory access in the gamepad API in Google Chrome prior to 78.0.3904.70 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html
- https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html
- https://crbug.com/998431
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html
- https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html
- https://crbug.com/998431
Modified: 2024-11-21
CVE-2019-13701
Incorrect implementation in navigation in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html
- https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html
- https://crbug.com/998284
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html
- https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html
- https://crbug.com/998284
Modified: 2024-11-21
CVE-2019-13702
Inappropriate implementation in installer in Google Chrome on Windows prior to 78.0.3904.70 allowed a local attacker to perform privilege escalation via a crafted executable.
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html
- https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html
- https://crbug.com/991125
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html
- https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html
- https://crbug.com/991125
Modified: 2024-11-21
CVE-2019-13703
Insufficient policy enforcement in the Omnibox in Google Chrome on Android prior to 78.0.3904.70 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html
- https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html
- https://crbug.com/992838
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html
- https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html
- https://crbug.com/992838
Modified: 2024-11-21
CVE-2019-13704
Insufficient policy enforcement in navigation in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to bypass content security policy via a crafted HTML page.
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html
- https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html
- https://crbug.com/1001283
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html
- https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html
- https://crbug.com/1001283
Modified: 2024-11-21
CVE-2019-13705
Insufficient policy enforcement in extensions in Google Chrome prior to 78.0.3904.70 allowed an attacker who convinced a user to install a malicious extension to leak cross-origin data via a crafted Chrome Extension.
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html
- https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html
- https://crbug.com/989078
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html
- https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html
- https://crbug.com/989078
Modified: 2024-11-21
CVE-2019-13706
Out of bounds memory access in PDFium in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html
- https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html
- https://crbug.com/1001159
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html
- https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html
- https://crbug.com/1001159
Modified: 2024-11-21
CVE-2019-13707
Insufficient validation of untrusted input in intents in Google Chrome on Android prior to 78.0.3904.70 allowed a local attacker to leak files via a crafted application.
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html
- https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html
- https://crbug.com/859349
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html
- https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html
- https://crbug.com/859349
Modified: 2024-11-21
CVE-2019-13708
Inappropriate implementation in navigation in Google Chrome on iOS prior to 78.0.3904.70 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html
- https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html
- https://crbug.com/931894
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html
- https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html
- https://crbug.com/931894
Modified: 2024-11-21
CVE-2019-13709
Insufficient policy enforcement in downloads in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to bypass download restrictions via a crafted HTML page.
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html
- https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html
- https://crbug.com/1005218
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html
- https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html
- https://crbug.com/1005218
Modified: 2024-11-21
CVE-2019-13710
Insufficient validation of untrusted input in downloads in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to bypass download restrictions via a crafted HTML page.
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html
- https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html
- https://crbug.com/756825
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html
- https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html
- https://crbug.com/756825
Modified: 2024-11-21
CVE-2019-13711
Insufficient policy enforcement in JavaScript in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html
- https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html
- https://crbug.com/986063
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html
- https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html
- https://crbug.com/986063
Modified: 2024-11-21
CVE-2019-13713
Insufficient policy enforcement in JavaScript in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html
- https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html
- https://crbug.com/993288
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html
- https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html
- https://crbug.com/993288
Modified: 2024-11-21
CVE-2019-13714
Insufficient validation of untrusted input in Color Enhancer extension in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to inject CSS into an HTML page via a crafted URL.
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html
- https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html
- https://crbug.com/982812
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html
- https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html
- https://crbug.com/982812
Modified: 2024-11-21
CVE-2019-13715
Insufficient validation of untrusted input in Omnibox in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html
- https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html
- https://crbug.com/760855
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html
- https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html
- https://crbug.com/760855
Modified: 2024-11-21
CVE-2019-13716
Insufficient policy enforcement in service workers in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html
- https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html
- https://crbug.com/1005948
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html
- https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html
- https://crbug.com/1005948
Modified: 2024-11-21
CVE-2019-13717
Incorrect security UI in full screen mode in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to hide security UI via a crafted HTML page.
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html
- https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html
- https://crbug.com/839239
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html
- https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html
- https://crbug.com/839239
Modified: 2024-11-21
CVE-2019-13718
Insufficient data validation in Omnibox in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html
- https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html
- https://crbug.com/866162
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html
- https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html
- https://crbug.com/866162
Modified: 2024-11-21
CVE-2019-13719
Incorrect security UI in full screen mode in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to hide security UI via a crafted HTML page.
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html
- https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html
- https://crbug.com/927150
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html
- https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html
- https://crbug.com/927150
Modified: 2025-10-24
CVE-2019-13720
Use after free in WebAudio in Google Chrome prior to 78.0.3904.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00022.html
- http://packetstormsecurity.com/files/167066/Google-Chrome-78.0.3904.70-Remote-Code-Execution.html
- https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_31.html
- https://crbug.com/1019226
- https://security.gentoo.org/glsa/202004-04
- http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00022.html
- http://packetstormsecurity.com/files/167066/Google-Chrome-78.0.3904.70-Remote-Code-Execution.html
- https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_31.html
- https://crbug.com/1019226
- https://security.gentoo.org/glsa/202004-04
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2019-13720
Modified: 2024-11-21
CVE-2019-13721
Use after free in PDFium in Google Chrome prior to 78.0.3904.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00022.html
- https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_31.html
- https://crbug.com/1013868
- http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00022.html
- https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_31.html
- https://crbug.com/1013868
Modified: 2024-11-21
CVE-2019-13765
Use-after-free in content delivery manager in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Modified: 2025-05-30
CVE-2019-15903
In libexpat before 2.2.8, crafted XML input could fool the parser into changing from DTD parsing to document parsing too early; a consecutive call to XML_GetCurrentLineNumber (or XML_GetCurrentColumnNumber) then resulted in a heap-based buffer over-read.
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00080.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00081.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00016.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00017.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00018.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00019.html
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
- http://packetstormsecurity.com/files/154503/Slackware-Security-Advisory-expat-Updates.html
- http://packetstormsecurity.com/files/154927/Slackware-Security-Advisory-python-Updates.html
- http://packetstormsecurity.com/files/154947/Slackware-Security-Advisory-mozilla-firefox-Updates.html
- http://seclists.org/fulldisclosure/2019/Dec/23
- http://seclists.org/fulldisclosure/2019/Dec/26
- http://seclists.org/fulldisclosure/2019/Dec/27
- http://seclists.org/fulldisclosure/2019/Dec/30
- https://access.redhat.com/errata/RHSA-2019:3210
- https://access.redhat.com/errata/RHSA-2019:3237
- https://access.redhat.com/errata/RHSA-2019:3756
- https://github.com/libexpat/libexpat/commit/c20b758c332d9a13afbbb276d30db1d183a85d43
- https://github.com/libexpat/libexpat/issues/317
- https://github.com/libexpat/libexpat/issues/342
- https://github.com/libexpat/libexpat/pull/318
- https://lists.debian.org/debian-lts-announce/2019/11/msg00006.html
- https://lists.debian.org/debian-lts-announce/2019/11/msg00017.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A4TZKPJFTURRLXIGLB34WVKQ5HGY6JJA/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BDUTI5TVQWIGGQXPEVI4T2ENHFSBMIBP/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S26LGXXQ7YF2BP3RGOWELBFKM6BHF6UG/
- https://seclists.org/bugtraq/2019/Dec/17
- https://seclists.org/bugtraq/2019/Dec/21
- https://seclists.org/bugtraq/2019/Dec/23
- https://seclists.org/bugtraq/2019/Nov/1
- https://seclists.org/bugtraq/2019/Nov/24
- https://seclists.org/bugtraq/2019/Oct/29
- https://seclists.org/bugtraq/2019/Sep/30
- https://seclists.org/bugtraq/2019/Sep/37
- https://security.gentoo.org/glsa/201911-08
- https://security.netapp.com/advisory/ntap-20190926-0004/
- https://support.apple.com/kb/HT210785
- https://support.apple.com/kb/HT210788
- https://support.apple.com/kb/HT210789
- https://support.apple.com/kb/HT210790
- https://support.apple.com/kb/HT210793
- https://support.apple.com/kb/HT210794
- https://support.apple.com/kb/HT210795
- https://usn.ubuntu.com/4132-1/
- https://usn.ubuntu.com/4132-2/
- https://usn.ubuntu.com/4165-1/
- https://usn.ubuntu.com/4202-1/
- https://usn.ubuntu.com/4335-1/
- https://www.debian.org/security/2019/dsa-4530
- https://www.debian.org/security/2019/dsa-4549
- https://www.debian.org/security/2019/dsa-4571
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.tenable.com/security/tns-2021-11
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00080.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00081.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00016.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00017.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00018.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00019.html
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
- http://packetstormsecurity.com/files/154503/Slackware-Security-Advisory-expat-Updates.html
- http://packetstormsecurity.com/files/154927/Slackware-Security-Advisory-python-Updates.html
- http://packetstormsecurity.com/files/154947/Slackware-Security-Advisory-mozilla-firefox-Updates.html
- http://seclists.org/fulldisclosure/2019/Dec/23
- http://seclists.org/fulldisclosure/2019/Dec/26
- http://seclists.org/fulldisclosure/2019/Dec/27
- http://seclists.org/fulldisclosure/2019/Dec/30
- https://access.redhat.com/errata/RHSA-2019:3210
- https://access.redhat.com/errata/RHSA-2019:3237
- https://access.redhat.com/errata/RHSA-2019:3756
- https://github.com/libexpat/libexpat/commit/c20b758c332d9a13afbbb276d30db1d183a85d43
- https://github.com/libexpat/libexpat/issues/317
- https://github.com/libexpat/libexpat/issues/342
- https://github.com/libexpat/libexpat/pull/318
- https://lists.debian.org/debian-lts-announce/2019/11/msg00006.html
- https://lists.debian.org/debian-lts-announce/2019/11/msg00017.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A4TZKPJFTURRLXIGLB34WVKQ5HGY6JJA/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BDUTI5TVQWIGGQXPEVI4T2ENHFSBMIBP/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S26LGXXQ7YF2BP3RGOWELBFKM6BHF6UG/
- https://seclists.org/bugtraq/2019/Dec/17
- https://seclists.org/bugtraq/2019/Dec/21
- https://seclists.org/bugtraq/2019/Dec/23
- https://seclists.org/bugtraq/2019/Nov/1
- https://seclists.org/bugtraq/2019/Nov/24
- https://seclists.org/bugtraq/2019/Oct/29
- https://seclists.org/bugtraq/2019/Sep/30
- https://seclists.org/bugtraq/2019/Sep/37
- https://security.gentoo.org/glsa/201911-08
- https://security.netapp.com/advisory/ntap-20190926-0004/
- https://support.apple.com/kb/HT210785
- https://support.apple.com/kb/HT210788
- https://support.apple.com/kb/HT210789
- https://support.apple.com/kb/HT210790
- https://support.apple.com/kb/HT210793
- https://support.apple.com/kb/HT210794
- https://support.apple.com/kb/HT210795
- https://usn.ubuntu.com/4132-1/
- https://usn.ubuntu.com/4132-2/
- https://usn.ubuntu.com/4165-1/
- https://usn.ubuntu.com/4202-1/
- https://usn.ubuntu.com/4335-1/
- https://www.debian.org/security/2019/dsa-4530
- https://www.debian.org/security/2019/dsa-4549
- https://www.debian.org/security/2019/dsa-4571
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.tenable.com/security/tns-2021-11